• Can a user apply for another public key based on its pseudonym and use the obtained public key in DH key exchange?

    用户可以申请一个公共密钥基础假名DH密钥交换使用获得的公共密钥?

    youdao

  • Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.

    由于数字签名建立公用密钥密码术基础上的,因此计算个数字签名所花时间往往要比计算一个mac长得多。

    youdao

  • If access is based entirely on self-signed certificates, deleting the public key of a certificate from the trust store revokes its access.

    如果访问完全基于自签名证书,则信任存储区中删除证书公钥将撤销访问权。

    youdao

  • Unless your API is a free, read-only public API, don't use single key-based authentication.

    除非API一个免费的,只读公开api,否则不要使用单一的基于密钥验证

    youdao

  • This password check is done even if the user is following the public key or host-based authentication.

    即使用户采用公共密钥基于主机身份验证,也会执行这个密码检查

    youdao

  • This process is, in turn, based on the public key of the signer.

    相反,这个过程基于签名者公有密钥

    youdao

  • Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.

    公钥-私组合公共密钥基础设施核心建立非对称密码的基础

    youdao

  • The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.

    SSL协议基于公钥密码,加密密钥成对出现公钥密码中,它们是在数学上相关的,无法由个推知另一个。

    youdao

  • So for applications that need to have a GSS-API mechanism which is based on a public-key infrastructure, SPKM is the answer.

    因此,当应用程序需要一种基于公共密钥基础设施GSS-API机制时,SPKM 就能满足的要求。

    youdao

  • An SSH-based identity consists of two parts: a public key and a private key.

    个基于ssh身份包括两个部分个公钥一个私钥。

    youdao

  • RSA public-key cryptography is based on this property of factorization.

    RSA公钥密码系统就是基于这种因数分解特性

    youdao

  • It then describes how you can achieve authentication based on public key technology, using the new GSS-API security mechanisms with the customizable DB2 UDB security plug-ins.

    然后将描述如何通过使用新的具有可定制DB 2UDB安全插件的GSS - API安全机制实现基于公钥技术身份验证

    youdao

  • The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.

    公钥密码启用安全性服务基于这样的消息解密机制,共有密钥只能通过相应私有密钥才能解密,反之亦然。

    youdao

  • As you saw in Part 1, this public key would be based on the RSA algorithm.

    第1部分可以看到这个公钥基于rsa算法生成的。

    youdao

  • As described earlier, the public-private key pair is based on the RSA algorithm.

    前面讲过,-私密钥基于rsa算法的。

    youdao

  • SPKM is a GSS-API mechanism which is based on a public key rather than a symmetric key infrastructure.

    SPKM一种GSS - API机制基于公钥对称密钥基础设施。

    youdao

  • No SSH server configuration is necessary, since, by default, SSH will attempt to use public key-based authentication before password based authentication.

    这里不需要ssh服务器配置因为默认情况下,在基于密码认证之前,ssh尝试使用基于公钥的认证。

    youdao

  • Comparing host-based authentication to public key-based authentication.

    比较基于主机的认证和基于公钥的认证。

    youdao

  • Type the following command on a single line to create a key pair and self-signed public key certificate to represent the J2EE-based EchoService client.

    行中键入下面命令创建密钥自签署公钥证书表示基于J2EE的EchoService客户机。

    youdao

  • Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).

    而且需要root授权就可以设置基于公钥认证(部分基于主机的认证需要root访问)。

    youdao

  • Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.

    使用ssh的基于主机认证基于公钥的认证基于rshrhost的认证安全

    youdao

  • OpenSSH supports two types of encryption, namely host-based authentication and public-key authentication.

    OpenSSH支持两种类型加密基于主机的认证公钥认证。

    youdao

  • At this point, ssh public key-based authentication is now complete, and you can proceed to " DB2 configuration."

    至此ssh 基于公钥认证已经完成,现在可以进入DB2配置”。

    youdao

  • To guarantee the system safe, this thesis designed a new kind of Identity certification method based on the mode of keywords and public-key certification.

    为了保证系统安全性论文结合基于口令公钥认证模式设计了一种新型身份认证方法

    youdao

  • A distributed key generation protocol for public key cryptosystem based on discrete-log is proposed using generalized verifiable secret sharing.

    利用广义可验证秘密分享提出基于离散对数的公钥体制密钥分布式生成协议

    youdao

  • Elliptic curve cryptosystem is a kind of public-key cryptosystem based on algebra curve.

    椭圆曲线密码体制基于代数曲线公开钥密码体制。

    youdao

  • Both the symmetric key systems and public key systems currently used are based on the model of computational security.

    目前密钥系统无论是单钥体制还是公钥体制建立计算安全模型上。

    youdao

  • By introducing public key cryptosystem to the authentication mechanism, the author proposed a 3g authentications and key agreement protocol based on public key cryptosystem.

    认证机制中引入公钥密码体制,提出一个基于公钥密码体制的3g认证密钥分配协议

    youdao

  • This paper presents a blind group signature scheme based on XTR public key system, and analyzes its security and efficiency.

    论文提出了一种基于XTR公钥体制签名方案分析了安全性效率。

    youdao

  • Therefore constructing identity-based public key architecture has become a new approach to solve secure Email problem.

    构造基于身份的公钥系统成为解决电子邮件安全问题的一种新的途径

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定